Skip to content

[Penta Inside] Penta Security 亮相 2025 年首爾 AWS 高峰會

Penta Security 於 AWS Summit Seoul 2025 與雲端領袖交流並展示先進安全方案組合 

在韓國規模最大的 IT 會議 AWS Summit Seoul 2025 上,現場氣氛熱烈,生成式 AI 和雲端創新的未來成為全場焦點。Penta Security 很榮幸能身處活動核心,與數千名與會者互動,並展示我們全面的雲端安全解決方案組合。

在我們的展覽攤位上,我們為三款核心雲端產品進行了現場示範和技術諮詢:D.AMO 密碼學平台、WAPPLES SA 虛擬化網站防火牆,以及 Cloudbric WAF+ 安全 SaaS 平台。每款解決方案都旨在應對企業深入雲端時所面臨的複雜挑戰。

為了更深入地了解這些挑戰,我們在攤位上進行了現場調查。結果非常明確:

  • 近半數(47.7%)的受訪者將雲端安全視為他們最關鍵的考量。
  • 在選擇解決方案時,他們優先考慮「高度安全性」(37.2%)和「成本效益」(18.4%),這印證了市場對成熟、高效安全產品的需求。

本次活動中的對話與反饋非常寶貴。作為 AWS 的長期合作夥伴,我們比以往任何時候都更加致力於利用這些見解來強化我們的解決方案,並利用 AWS 的全球生態系統,幫助更多企業保護其雲端旅程的安全。感謝所有蒞臨我們攤位並分享觀點的朋友。

關於 Penta Security

Penta Security 採取全方位的策略來涵蓋資訊安全的每個面向。本公司持續努力,透過廣泛的 IT 安全產品,在幕後確保客戶的安全。因此,Penta Security 總部位於韓國,並已在全球擴展,成為亞太地區的市佔領導者。

作為韓國最早進入資訊安全領域的公司之一,Penta Security 已經開發出廣泛的基礎技術。我們將科學、工程與管理相結合,擴展自身的技術能力,並以此技術視角做出關鍵決策。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

Pentasecurity 參加中東和非洲最大的展覽會 GISEC 2025

GISEC 2025

GISEC 2025 洞察:數據主權與智慧城市如何形塑中東網路安全的未來 

Penta Security 已成功結束其在 GISEC 2025 的參展活動,該展覽是中東及非洲地區規模最大的網路安全展覽會,為我們提供了親身洞察全球最具活力的數位市場之一的機會。在杜拜舉行的這次活動,凸顯了該地區的快速轉型,並揭示了由此而生的關鍵安全挑戰與機遇。

中東的網絡安全市場正經歷爆炸性增長,預計年增長率為 9.6%。我們在 GISEC 的參與揭示了此增長背後的兩大主要驅動力:一是對數據主權的新監管指令,二是宏大的智慧城市計畫所帶來的巨大安全需求。

新的監管指令:數據加密已成必然要求

我們與區內銀行、政府機構和企業交流後的一個主要收穫是,新的資料保護法規帶來了深遠影響。隨著如阿拉伯聯合大公國《個人資料保護法》(PDPL)等法規的全面實施,各機構正從基礎安全防護轉向優先考慮全面的資料保護。這催生了由合規驅動的、對穩健資料加密方案的迫切需求。我們的 D.AMO 密碼學平台所獲得的濃厚興趣證實,保護核心數據已不再是「可有可無」的選項,而是該地區業務營運的基礎要求。

保護智慧城市的願景

該地區宏大的數碼轉型和智慧城市計畫,正在創造一個由互聯服務、應用程式和 API 組成的龐大新生態系統。這些計畫在推動創新的同時,也急遽擴大了數碼攻擊面。我們觀察到與會者普遍認為,這些新的公共和金融領域服務從一開始就需要穩健且專業的保護。這印證了市場對全面性網站應用程式與 API 保護(WAAP)解決方案(如我們的智慧型 WAPPLES 平台)的需求,以及對敏捷、易於部署的安全方案(如我們的 Cloudbric WAF+ SaaS 解決方案)的需求。

成為數碼未來的策略夥伴

從 GISEC 2025 獲得的洞察證實,Penta Security 專注於基礎安全 —— 即資料加密和應用程式保護 —— 的策略,與中東和非洲地區的策略性需求完全契合。在與具潛力的合作夥伴及客戶進行了高效的會談後,我們比以往任何時候都更加致力於擴大業務版圖,並作為關鍵合作夥伴,為該地區實現數位雄心的安全保駕護航。

關於 Penta Security

Penta Security 採取全方位的策略來涵蓋資訊安全的每個面向。本公司持續努力,透過廣泛的 IT 安全產品,在幕後確保客戶的安全。因此,Penta Security 總部位於韓國,並已在全球擴展,成為亞太地區的市佔領導者。

作為韓國最早進入資訊安全領域的公司之一,Penta Security 已經開發出廣泛的基礎技術。我們將科學、工程與管理相結合,擴展自身的技術能力,並以此技術視角做出關鍵決策。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

Penta Security Expands Cloudbric Managed Rules for AWS WAF to Two New Regions

Penta Security, a leading cyber security company and provider of web application security in the Asia-Pacific region, has expanded the service region for Cloudbric Managed Rules for AWS WAF to two new regions this year.

Cloudbric Managed Rules for AWS WAF (CMR) is a managed rule groups service for AWS WAF. Managed rule groups offer a preset of security rules for users and are provided by AWS and Independent Software Vendors (ISVs). Penta Security currently offers six CMR products on the AWS Marketplace, which users can subscribe to and implement on AWS WAF. CMR is based on the core technologies of Penta Security’s proprietary Web Application and API Protection (WAAP) solution and has been validated by a third-party IT solutions comparative testing firm, The Tolly Group, for its top-tier detection rate.

Following AWS’s expansion to Calgary, Canada in December 2023 and Malaysia in December 2024, Penta Security promptly onboarded these new regions, aiming to help users with the challenge of creating their own security rules when using AWS WAF.

Taejoon Jung, Director of the Planning Division at Penta Security commented, “Defining and managing security rules can be a complex task for AWS WAF users if they do not have security expertise, and Cloudbric Managed Rules were specifically designed to address these challenges. By swiftly onboarding new AWS regions, we aim to foster a safer environment for AWS WAF users.”

To further address the challenges of managing and maintaining security, Penta Security has also recently launched Cloudbric WMS, a usage-based SaaS managed service for AWS WAF, now available for subscription on the AWS Marketplace.

 

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Cloudbric Managed Rules for IP Reputation Management

In establishing security through solutions such as firewalls, IP Reputation is a crucial metric for identifying and blocking malicious traffic. It assesses the risk of an IP using factors such as traffic volume, traffic type, presence of malware, and whether the IP has been involved in illegal activities like hacking or phishing. Managing IP Reputation is an important aspect of web security as traffic can be allowed or blocked based on the credibility of IPs, which is determined by their history.

Cloudbric Managed Rules for IP Reputation Management

Penta Security provides a solution for managing IP Reputation through “Cloudbric Managed Rules.”

🛡️ Malicious IP Protection

Cloudbric Managed Rules for AWS WAF – Malicious IP Protection was created to protect the websites and web applications against the traffic originating from various threat IPs. It utilizes the Threat DB of Cloudbric Labs, which collects and analyzes the threat intelligence from 700,000 websites in 148 countries to create a Malicious IP Reputation list and respond to the Malicious IP traffic.

🛡️ Anonymous IP Protection

Cloudbric Managed Rules for AWS WAF – Anonymous IP Protection provides integrated security against Anonymous IPs originating from various sources including VPNs, Data Centers, DNS Proxies, Tor Networks, Relays, and P2P Networks. It utilizes the Anonymous IP list, managed and updated by Cloudbric Labs, to detect and respond to Anonymous IPs that can easily be exploited for malicious purposes and prevent threats such as geo-location based fraud, DDoS, or license and copyright infringements.

 

Cloudbric Managed Rules for AWS WAF

Cloudbric Managed Rules for AWS WAF is created based on the security technologies and expertise of WAPPLES which has protected the web services for enterprises since 2005. Cloudbric Managed Rules have recently proven its performance by displaying a detection rate of 97.31% against other Managed Rules, which has been validated through a report (Penta Security Cloudbric Managed Rules – Comparative Effectiveness of the API Security-Related Managed Rule Groups for AWS WAF) published by an independent third-party IT testing, validation, and analysis organization, The Tolly Group.

✅ Expertise in Security

Cloudbric Managed Rules for AWS WAF utilizes the latest threat intelligence collected and analyzed by Penta Security’s own Cyber Threat Intelligence (CTI) to respond to web threats against web applications and APIs.

✅ Continuous Security Management

Cloudbric Managed Rules respond to the latest threats and maintain a stable level of security through continuous updates and management by security experts with over 20 years of experience in the field.

✅ Official Partner of AWS

Penta Security is an official launch partner for AWS WAF Ready, provider partner of AWS Activate, and AWS Public Sector Partner, and all Cloudbric products provided in AWS Marketplace by Penta Security have been validated by AWS through the Foundational Technical Review.

 

If you are looking to establish a safe web security environment without the need of security expertise, subscribe to Cloudbric Managed Rules for AWS WAF today!

👉 For more information
👉 To subscribe to Cloudbric Managed Rules

 

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Anonymous IP: Why You Should Block It and How.

AnonymousIP(1)

In February 2016, the global content streaming service, Netflix, officially announced that it would block all VPNs and proxy use on its platform. This decision came as a response to the abuse of Anonymous IPs, which had been a persistent issue for the service. Although many users would employ Anonymous IPs for privacy and security reasons, some exploited them for illegal purposes. One example was Netflix users using VPNs to bypass the geo-restrictions on contents that are not available in their region. The geo-restrictions were put in place due to licensing agreements, but users soon discovered that accessing the platform through an IP from another country allowed them to stream the geo-restricted content. As a result, Netflix was forced to address the issues related to license and copyright infringement.

 

Anonymous IP utilizes methods such as VPNs, Tor Nodes, Proxies, and Data Centers to mask the IPs and the geolocation to protect the privacy of the user and provide a secure access to the web. However, it is also a double-edged sword that can very well be used for illegal activities such as:

  • Manipulation of public opinion or reviews.
  • Distribution of malware while concealing the distributor’s identity.
  • Bypassing geo-pricing, which violates company policy.
  • License and copyright infringement.
    As such, detecting and blocking Anonymous IPs can be a smart move for companies and organizations of all industries to reduce the risk of cyber threats.
    Many companies and organizations already make use of various solutions to respond to Anonymous IPs. Like Netflix, a significant number of content streaming services and other companies in the media & entertainment industry have adopted Anonymous IP-related solutions to protect their media contents. Some companies use Anonymous IP-related solutions to prevent DDoS attacks carried out by zombie PCs infected via Data Centers. Online game companies block illegal access to geo-blocked servers, and finance companies, including cryptocurrency platforms, prevent fraud by blocking attempts to bypass the geolocation restrictions.
    Such solutions are largely categorized into two types: IP Reputation Database (often referred to as “IP Reputation Checkers”) and IP Reputation Filters. There are pros and cons to both types of solutions, and the choice between them depends on the available resources and the needs of the user.
    IP Reputation Database IP Reputation Filters
    • Focuses on providing detailed information about the IPs.
    • Such information includes the method of creating Anonymous IPs, geolocation data, and domain information.
    • The IP Reputation Database is constantly updated.
    • The user is given more flexibility as the user can utilize the information to configure the security settings as fit.
    • However, a deep understanding of security is required for the user to configure a robust security.
    • Because the IP Reputation Database is constantly updated, the user has to subscribe to the database service, and in many cases, the user may be charged per query.
    • Focuses on providing a proactive security solution by detecting and blocking the traffic based on the Anonymous IP list.
    • IP Reputation Filters are often included in a Web Application Firewall (WAF) solution, and do not provide as much flexibility as the users configuring the security settings themselves.
    • The performance of the IP Reputation Filter may depend on the source of the Anonymous IP list, update cycle, and the performance of WAF.
    • However, users do not need expert-level security knowledge.
    • Security measures can be quickly implemented.
    • Resources required in configuring the security settings are greatly reduced.
    •  
      • Penta Security’s direction in responding to Anonymous IPs is IP Reputation Filters. Penta Security currently provides a managed rule group, Cloudbric Managed Rules for AWS WAF – Anonymous IP Protection, in the AWS Marketplace.
    •  

    AnonymousIP(2)

    •  
      • Taking advantage of the characteristics of managed rule groups for AWS WAF, which enables the user to quickly adopt the security rules predefined by security vendors simply through subscribing to the product, Penta Security provides a quick and easy solution for AWS WAF users to detect and block any threats that can be caused by Anonymous IPs. Penta Security’s Cloudbric Managed Rules for AWS WAF – Anonymous IP Protection is defined based on the Anonymous IP List, which is continuously updated with the latest IP Reputation data, collected and analyzed by Penta Security’s own Cyber Threat Intelligence (CTI). With a cost efficient, pay-as-you-go pricing, users are able to implement a robust security solution against Anonymous IPs without the need for security expertise by subscribing to the product.
    •  
      • Cloudbric Managed Rules for AWS WAF – Anonymous IP Protection is available at

    👉link.

     

     

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×